º»¹®/³»¿ë
°ø¸®ÁÖÀÇ´Â ¶Ç´Ù¸¥ ¸ñÀû·ÐÀû À±¸®¼³ÀÎ À±¸®Àû À̱âÁÖÀǿʹ ´Þ¸® ŸÀÎÀ» ½ÅÁßÇÏ°Ô ´ë¿ìÇϸ鼵µ ¼±(the good)À» ÃæºÐÈ÷ Áß´ëÇÏ°Ô ´Ù·ç°í ¶ÇÇÑ ±âº» ¿øÄ¢µé °£¿¡ ÀÖÀ» ¼ö ÀÖ´Â »óÃæÀÇ ¹®Á¦µµ ÀϼÒÇØ Áشٴ ÀåÁ¡À» Áö´Ñ ±î´ß¿¡ Å« ¸Å·ÂÀ» °¡Áø´Ù. ÀÌ·¯ÇÑ °ø¸®ÁÖÀÇ´Â ±Ù´ë °ø¸®ÁÖÀÇÀÇ ¼±±¸ÀÚÀÎ º¥´ã(J.Bentham)¿¡ ÀÇÇØ Á¦½ÃµÈ ÀÌÈÄ ¹Ð(J.S. Mill)ÀÇ ÁúÀû Äè¶ôÁÖÀÇ¿¡ ÀÇÇØ ¼öÁ¤µÇ¾ú°í ÀÌÈÄ ½ÃÁîÀ§Å©(H. Sidgwick)¿Í ½º¸¶Æ®(J.J.C. Smart) µî¿¡ ÀÇÇØ °è½Â¹ßÀüµÇ¾ú´Ù.
ÀÌ·¯ÇÑ °ø¸®ÁÖÀÇÀÇ ÀÔÀå¿¡¼ Á¤º¸»çȸ¿¡¼ »õ·Î Á¦±âµÇ´Â À±¸®ÀûÀÎ ¹®Á¦µéÀ» ÇØ°áÇϱâ À§ÇÏ¿© »çȸÁ¤ÀÇÀÇ ±âÁØÀ» Á¦½ÃÇÏ´Â °Íµµ ÃæºÐÈ÷ °¡´ÉÇÒ °ÍÀÌ´Ù. »Ó¸¸ ¾Æ´Ï¶ó °ø¸®ÁÖÀÇ´Â ±× ±Ùº» ¿ø¸®¸¦ ¼öÁ¤ÇÏÁö ¾Ê°í ½±°Ô Á¤º¸»çȸ¿¡ Àû¿ëÇÒ ¼ö ÀÖ¾î º¸Àδٴ ÀåÁ¡ÀÌ ÀÖ¾î¼ Á¤º¸»çȸ¿¡¼ÀÇ À±¸®·Î¼ °¡Àå ¸ÕÀú °í·Á´ë»óÀÌ µÉ ¼ö ÀÖÀ» °ÍÀÌ´Ù. Áï ¹«¾î°¡ ÁöÀûÇÑ °³³äÀû °ø¹éÀÌ °ø¸®ÁÖÀǸ¦ Á¤º¸»çȸÀÇ µµ´öÀû »óȲ¿¡ Àû¿ëÇÏ´Â µ¥¿¡¼´Â °ÅÀÇ »ý±âÁö ¾ÊÀ» °Í °°´Ù. °ø¸®ÁÖÀǰ¡ ¼öÁ¤¾øÀÌ ½±°Ô Á¤º¸»çȸ¿¡ Àû¿ëµÉ ¼ö ÀÖ´Â °ÍÀ¸·Î º¸ÀÌ´Â ±î´ßÀº ±×°ÍÀÌ ÇàÀ§¿Í °á°ú °£ÀÇ °ü°è¸¸À» ¹®Á¦»ïÀ¸¸ç ¾î´À »çȸ¿¡¼µµ ÇàÀ§¿Í °á¡¦(»ý·«)
Âü°í¹®Çå
1. °»óÇö (1996), {Á¤º¸Åë½ÅÇõ¸í°ú Çѱ¹»çȸ} (¼¿ï: Çѳª·¡)
2. ¹ÚÁ¤¼ø (1997), `Á¤º¸ Åë½Å ¹®ÈÀÇ µµ´öÀÇ Á¤Ã¼¼º ¹®Á¦`, Çѱ¹ öÇÐȸ 1997³âµµ Ãá°èÇмú¹ßÇ¥´ëȸ ¹ßÇ¥ ³í¹®.
3. ¹ÚÇüÁØ (1996), `Á¤º¸»çȸ¿¡¼ »çȸÀû ºÒÆòµîÀÇ ¸ÞÄ¿´ÏÁò`, ¡ºÁ¤º¸»çȸ¿Í »çȸÀ±¸®¡»¾Æ»êÀç´Ü Á¦7ȸ »çȸÀ±¸® ½ÉÆ÷Áö¾ö
4. ¹éÁ¾Çö (1995), ¡ºÄÆ® <½ÇõÀ̼ººñÆÇ> ³í°í¡»(Àç´Ü¹ýÀÎ ¼ºÃµ¹®ÈÀç´Ü)
5. ÀÓÈ«ºó (1996), `Á¤º¸»çȸÀÇ »ýȰÀ±¸®`, {Á¤º¸»çȸ¿Í »çȸÀ±¸®} ¾Æ»êÀç´Ü Á¦7ȸ »çȸÀ±¸® ½ÉÆ÷Áö¾ö.
6. Ȳ°æ½Ä (1997), `»ê¾÷»çȸ, À±¸®, Á¤º¸»çȸ`, Çѱ¹ »çȸ, À±¸®ÇÐȸ 2¿ù ¹ßÇ¥ ³í¹®.
7. Ȳ°æ½Ä (1985), {»çȸÁ¤ÀÇÀÇ Ã¶ÇÐÀû ±âÃÊ} (¹®Çаú Áö¼º)
8. Barlow, John P (1995). `Coming Into the Country` in Computers, Ethics & Social Values. (Prentice Hall)
9. Birkerts, Sven (1996) `The Electronic Hive : Refuse it` in Computerization and Controversy, (Academic Press)
10. Bynum, Terrell Ward & Rogerson, Simon (1996), `Introduction and Overview:Global Information Ethics`, Science and Engineering Ethics, vol. 2, (Opragen Publications)
11. Deitel, H.M (1990). An Introduction to Operating Systems, Á¶À¯±Ù, °í°Ç °ø¿ª, (È«¸ª°úÇÐ ÃâÆÇ»ç).
12. Frankena, William K. (1985). {À±¸®ÇÐ} Ȳ°æ½Ä ¿ª, Á¾·Î¼ÀûÃâÆÇ ÁÖ½Äȸ»ç..
13. Hospers, John (1982), Human Conduct : Problems of Ethics (Harcourt Brace Jovanovich. Inc.)
14. Johnson, Deborah G. (1997), Computer Ethics, Ãߺ´¿Ï ¿Ü ¿Å±è (ÇÑ¿ï ¾ÆÄ«µ¥¹Ì)
15. Johnson, Deborah G & Nissenbaum, Helen (1995), `What Is Computer Ethics?:Introduction` Computers, Ethics & Social Values.. (Prentice Hall)
16. Keyworth, G.A. (1996), `People and Society in Cyberspace`, http://www.pff.org/pff/tsot-l.html
17. Krystyna Gorniak-Kockkowska (1996), `The Computer Revolution and the Problem of Global Ehtics` Science and Engineering Ethics, vol.2 (Opragen Publications).
18. Locke, John (1952), The Second Treatise of Government, (The Liberal Arts Press, Inc.)
19. Maison, Richard O (1986), `Four Ethical Issues of the Information Age`, URL = http://www.misq.org/archivist/vol/no10/issue1/vol10no1.mason.html.
20. Manner, Walter (1996), `Unique Ethical Problems in Information Technology`, Science and Engineering Ethics, vol. 2 (Opragen Publications)
21. Moor, James H (1995) . `What Is Computer Ethics?`, Computers, Ethics and Social Values (Englewood Cliffs).
22. National Academy of Sciences (1995), `Rights and Responsibilities of Participants in Networked Communities` The Nature of Electronic Networks, URL = http://www.nap.edu/readingroom/books/rights/index.html
23. Nissenbaum, Helen (1995), `Should I Copy My Neighbor`s Software?`, in Computers, Ethics & Social Values, (Prentice Hall)
24. Rachels, James (1997), `Why Privacy Is Important` in Computers, Ethics, and Society, (Oxford University Press)
25. Rheingold, H (1993), The Virtual Community: Home steading on the Electronic Frontier ,. Harper Perennial, Introduction, URL = http://www.well.com/user/hlr/vcbook/html